by Howard G. Buffett · 2 Apr 2018 · 350pp · 109,521 words
too many agents to staff inland checkpoints instead of stopping smugglers and illegal border crossers right at the border. BP uses a layered strategy called Defense in Depth that means there are roadside checkpoints as well as permanent checkpoints well inland of the border. Today, by law, only authorized federal agents can actually
by Herbert P. Bix · 1 Jan 2000 · 1,056pp · 275,211 words
, without inflicting any serious damage on the American invasion force.96 After desperate fighting, in which Japanese ground commanders once again failed to prepare adequate defenses in depth, Saipan, Guam, and Tinian fell and quickly became forward U.S. bases for long-range B-29 (“Superfortress”) bombers. The capture of Saipan on July
by Nathaniel C. Fick · 14 Apr 2006
low overcast threatening rain. Helicopters could not fly under the weather, and jets above it couldn’t provide accurate close air support. Facing a coordinated defense-in-depth, with little idea of what lay to the north, the colonel decided to pull back two kilometers and set up a hasty defense on the
by Seth G. Jones · 29 Apr 2012 · 649pp · 172,080 words
send messages, such as blankets and smoke and flares. The enemy, led by Mansour and supported by al Qa’ida fighters, planned to employ a “defense in depth” strategy if they were attacked, inflicting as many casualties as possible on American and allied soldiers instead of denying access. They would permit U.S
by Robert H. Latiff · 25 Sep 2017 · 158pp · 46,353 words
, March 14, 2013. Echoing the concerns of senior combat leaders: Janine Davidson, “The Warrior Ethos at Risk: H. R. McMaster’s Remarkable Veterans Day Speech,” Defense in Depth blog, Council on Foreign Relations, November 18, 2014, https://fortunascorner.com/2014/11/19/the-warrior-ethos-at-risk-h-r-mcmasters-remarkable-veterans-day
…
tried to use OCO funds: Emerson Brooking and Janine Davidson, “How the Overseas Contingency Operations Fund Works—and Why Congress Wants to Make It Bigger,” Defense in Depth blog, Council on Foreign Relations, June 16, 2015, https://www.geopolintelligence.com/how-the-overseas-contingency-operations-fund-works-and-why-congress-wants-to-make
by Cornelius Ryan · 1 Jan 1959 · 439pp · 105,137 words
guns and other equipment if his plan of assault was to succeed, for Merville was no ordinary battery. Around it ranged a formidable series of defenses in depth. To get to the heart of the battery—four heavy guns in massive concrete emplacements—the 9th would have to pass through mine fields and
by Mark Hertsgaard · 15 Jan 2011 · 326pp · 48,727 words
protect Louisiana if we want to," said van Heerden, who, in his book The Storm, urged a three-layered approach to hurricane protection known as "defense in depth." "For your inner layer of defense," van Heerden told me, "you put hardened levees or flood walls in front of major population centers [such as
by Steven Pressfield · 5 May 2014 · 531pp · 139,948 words
, inevitably, one of scores of blockhouses and bricked-up strongpoints lining the corridor of minefields and barbed-wire entanglements that divided Jerusalem. A strategy of defense-in-depth is not possible in a nation that is only nine miles wide at its waist and whose commercial concentrations and population centers lie within artillery
…
wisdom on to their clients, the Egyptians. On top of this, Soviet engineers have overlaid the Russian system. Russian doctrine is linear. Its principle is defense in depth. You can recognize a Soviet position from the air by its multiple trench lines, one behind the other. In the rear of the first three
by Harold G. Moore and Joseph L. Galloway · 19 Oct 1991 · 496pp · 162,951 words
behind their lines. There, taking up positions that gave them good fields of fire, the remnants of the 2nd Platoon men provided some measure of defense in depth to Charlie Company. But the loss of four men crossing the clearing convinced me that further internal movements were inadvisable until we reduced the enemy
by Bruce Schneier · 7 Feb 2023 · 306pp · 82,909 words
is simplicity. Of course, many systems are naturally complex, but the simpler a system can be designed, the more secure it is likely to be. Defense in Depth: The basic idea is that one vulnerability shouldn’t destroy the whole system. In computer systems, the place you encounter this the most is multifactor
…
multifactor systems might include a biometric such as a fingerprint, or a small USB device you have to plug into your computer. For noncomputer systems, defense in depth is anything that prevents a single vulnerability from becoming a successful hack. It might be a deadbolt on your door in addition to the lock
…
mind, from our survival instincts to our craving for social status. They can be used against anyone. Protecting ourselves from cognitive hacks requires society-wide defense-in-depth: spanning education, regulation and—especially online—technical solutions. As digital technology occupies ever more of our attention, cognitive hacking is increasingly taking place by means
…
Cyber Grand Challenge, 228–29 de minimis rule, 249 debt financing, 101–2 decoy prices, 189 deep-fake technology, 192–93, 221 Deep Patient, 213 defense in depth, 59–60 Delaware Loophole, 130 DeSantis, Ron, 132–33 design process, 58–61 financial exchange hacks and, 85 simplicity in, 59, 80 threat modeling, 62
by Stephen Graham · 30 Oct 2009 · 717pp · 150,288 words
by C. J. Chivers · 12 Oct 2010 · 845pp · 197,050 words
by Michal Zalewski · 26 Nov 2011 · 570pp · 115,722 words
by Lawrence Freedman · 31 Oct 2013 · 1,073pp · 314,528 words
by Gershom Gorenberg · 19 Jan 2021 · 555pp · 163,712 words
by Adrian Hon · 5 Oct 2020 · 340pp · 101,675 words
by Robert B. Zoellick · 3 Aug 2020
by Rick Perlstein · 17 Aug 2020
by Nicole Perlroth · 9 Feb 2021 · 651pp · 186,130 words
by Rush Doshi · 24 Jun 2021 · 816pp · 191,889 words
by Ian Morris · 11 Oct 2010 · 1,152pp · 266,246 words
by Bruce Schneier · 1 Jan 2000 · 470pp · 144,455 words
by Joshua Cooper Ramo · 16 May 2016 · 326pp · 103,170 words
by Thomas A. Limoncelli, Strata R. Chalup and Christina J. Hogan · 27 Aug 2014 · 757pp · 193,541 words
by Robert Cowley · 5 May 1992 · 546pp · 176,169 words
by Orson Scott Card · 23 Nov 2000 · 361pp · 143,442 words
by Stross, Charles · 13 Jan 2004 · 404pp · 113,514 words
by M. E. Sarotte · 29 Nov 2021 · 791pp · 222,536 words
by Herman Kahn · 16 Jul 2007 · 1,117pp · 270,127 words
by Neal Stephenson · 2 May 2000 · 611pp · 186,716 words
by Lewis Sorley · 2 Jun 1999 · 565pp · 160,402 words
by Andy Oram and John Viega · 15 Dec 2009 · 302pp · 82,233 words
by Tom Clancy · 2 Jan 1994
by Tom Clancy · 2 Jan 1996
by Toby Ord · 24 Mar 2020 · 513pp · 152,381 words
by David Bellavia · 4 Sep 2007 · 325pp · 92,272 words
by Tom Clancy · 2 Jan 1993
by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield · 29 Mar 2020 · 1,380pp · 190,710 words
by John S. Burnett · 1 Jan 2002 · 399pp · 120,226 words
by Temple Grandin, Ph.d. · 11 Oct 2022
by Stross, Charles · 1 Jan 2011
by Tom Clancy and Grant (CON) Blackwood · 7 Dec 2010 · 795pp · 212,447 words
by Betsy Beyer, Chris Jones, Jennifer Petoff and Niall Richard Murphy · 15 Apr 2016 · 719pp · 181,090 words
by Dafydd Stuttard and Marcus Pinto · 30 Sep 2007 · 1,302pp · 289,469 words
by Brian Krebs · 18 Nov 2014 · 252pp · 75,349 words
by Michael Schwarz, Jeremy Anderson and Peter Curtis · 7 May 2002
by Neal Stephenson · 3 Jun 2019 · 993pp · 318,161 words
by Richard Tregaskis · 1 Mar 1943 · 264pp · 80,849 words
by Justin Schuh · 20 Nov 2006 · 2,054pp · 359,149 words
by Adam Greenfield · 14 Sep 2006 · 229pp · 68,426 words
by David N. Blank-Edelman · 16 Sep 2018
by Sam Newman · 25 Dec 2014 · 540pp · 103,101 words
by Rick Copeland · 4 Jun 2008 · 357pp · 63,071 words
by John Arundel · 25 Aug 2013 · 274pp · 58,675 words
by Titus Winters, Tom Manshreck and Hyrum Wright · 17 Mar 2020 · 214pp · 31,751 words
by Jeff Geerling · 9 Oct 2015 · 313pp · 75,583 words